Key Components of a Security Token Exchange